In systemd 223 through 235, a remote DNS server can respond with a custom crafted DNS NSEC resource record to trigger an infinite loop in the dnspacketreadtypewindow() function of the 'systemd-resolved' service and cause a DoS of the affected service.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "223"
},
{
"introduced": "0"
},
{
"last_affected": "224"
},
{
"introduced": "0"
},
{
"last_affected": "225"
},
{
"introduced": "0"
},
{
"last_affected": "226"
},
{
"introduced": "0"
},
{
"last_affected": "227"
},
{
"introduced": "0"
},
{
"last_affected": "228"
},
{
"introduced": "0"
},
{
"last_affected": "229"
},
{
"introduced": "0"
},
{
"last_affected": "230"
},
{
"introduced": "0"
},
{
"last_affected": "231"
},
{
"introduced": "0"
},
{
"last_affected": "232"
},
{
"introduced": "0"
},
{
"last_affected": "233"
},
{
"introduced": "0"
},
{
"last_affected": "234"
},
{
"introduced": "0"
},
{
"last_affected": "235"
}
]
}